All Products
Search
Document Center

Security Center:Release notes

Last Updated:Jul 23, 2024

This topic describes the release notes for Security Center and provides links to the relevant references.

July 2024

Feature

Category

Description

Involved edition

Release date

References

Core file monitoring

Feature iteration

The best practice document for configuring the core file monitoring feature is added. The document describes the configurations of monitoring rules and provides examples.

Enterprise and Ultimate

2024-07-01

Best practices for configuring the core file monitoring feature

June 2024

Feature

Category

Description

Involved edition

Release date

References

SDK for malicious file detection

Feature iteration

The results of malicious file detection that is performed by calling API operations are displayed in the list of at-risk files in the Security Center console.

Security Center editions for which the SDK for malicious file detection feature is enabled

2024-06-28

View detection results

Malicious file detection logs can be delivered to the Logstore dedicated to Security Center.

Malicious file detection logs

DingTalk chatbots can be added to send notifications. You can receive real-time notifications of detected malicious files in the DingTalk group that you specify.

Configure notification settings on the DingTalk Chatbot tab

Vulnerability management

Feature iteration

The vulnerability management feature can be used to scan servers that use SUSE and Kylin operating systems for vulnerabilities.

All editions

2024-06-20

Overview of vulnerability management

Application protection

Feature iteration

  • The statistics on application processes on the assets that you can add to the application protection feature are collected, and the list of the application processes is provided.

  • Assets on which application vulnerabilities are detected can be added to the application protection feature on the Application Vulnerability tab of the Vulnerabilities page.

  • The statistics on and trend chart of vulnerability prevention are provided on the Application Analysis tab of the Application Protection page.

Security Center editions for which the application protection feature is enabled

2024-06-19

Overview of application protection

Threat analysis and response

Feature iteration

EdgeRoutine logs, access logs, and Web Application Firewall (WAF) logs of Dynamic Content Delivery Network (DCDN) can be added to the threat analysis and response feature. The added logs are processed by using threat detection, event handling, Security Orchestration Automation Response (SOAR), and log storage capabilities.

Security Center editions for which the threat analysis and response feature is enabled

2024-06-19

Overview of threat analysis and response

Baseline check

Feature iteration

Debian 10, Debian 11, Debian 12, and TencentOS Server 3.1 are supported by the baseline check feature.

Advanced, Enterprise, and Ultimate

2024-06-19

Baseline check

Feature iteration

The maximum size of a weak password file that you can upload is increased to 40 KB.

Advanced, Enterprise, and Ultimate

2024-06-07

Baseline check

Installation of the Security Center agent

Feature iteration

Kylin V7 and Red Hat Enterprise Linux (RHEL) 9 are supported for the Security Center agent.

All editions

2024-06-06

Operating systems supported by the Security Center agent

Log analysis

Feature iteration

Agent event logs are supported for delivery and storage.

Security Center editions for which the log analysis feature is enabled

2024-06-06

Log types and log fields

May 2024

Feature

Category

Description

Involved edition

Release date

References

Container image scan

Feature iteration

The container image scan feature is supported for the China (Ulanqab) region.

Security Center editions for which the container image scan feature is enabled

2024-05-31

Overview of container image scan

Container

Feature iteration

The risk detection results of a single image can be exported.

Ultimate

2024-05-31

Manage container assets

Purchase

Feature iteration

When you purchase Security Center by using the subscription billing method, the Protected Servers and Cores parameters can be specified based on your business requirements. After you purchase Security Center, you can manage the quotas.

Anti-virus, Advanced, Enterprise, and Ultimate

2024-05-30

Manage quotas

Alerts

Feature iteration

The Suspicious process - Suspicious command alert is renamed Suspicious process - Suspicious probe command.

Anti-virus, Advanced, Enterprise, and Ultimate

2024-05-22

Overview of alerts

Application protection

Feature iteration

The text in the panel for attack alert details is optimized.

Security Center editions for which the quota for the application protection feature is purchased

2024-05-15

Handle attack alerts

SDK for malicious file detection

Feature iteration

The maximum size of a file that can be checked by the SDK for malicious file detection feature is increased from 20 MB to 100 MB.

Security Center editions for which the quota for the SDK for malicious file detection feature is purchased

2024-05-14

SDK for malicious file detection

Configuration assessment

Feature iteration

  • The number of check items that you can use free of charge is increased from 25 to more than 60. The check items are provided free of charge in Security Center Basic.

  • These check items do not consume your purchased quota.

Security Center editions for which the quota for the configuration assessment feature is purchased or the feature is enabled by using the pay-as-you-go billing method

2024-05-11

Overview of configuration assessment

Threat analysis and response

Feature iteration

The time picker and filter conditions on the Security Event Handling page are optimized.

Security Center editions for which the log storage capacity for the threat analysis and response feature is purchased

2024-05-09

Handle security events

April 2024

Feature

Category

Description

Involved edition

Release date

References

Threat analysis and response

Feature iteration

  • Tiered pricing is used for the log data that is added to the threat analysis and response feature. You are charged based on the size of logs that you deliver for hot storage.

  • The threat analysis and response feature decouples the analysis and handling capabilities, such as alerting, security event handling, and SOAR, from the log storage capability. This allows you to choose whether to purchase log storage capacity.

  • A global administrator account can be configured to manage all security events in multiple Alibaba Cloud accounts in a centralized manner.

Security Center editions for which the log storage capacity for the threat analysis and response feature is purchased

2024-04-26

[Notice] Billing rules of the threat analysis and response feature are changed

Application protection

New feature

The in-memory webshell prevention feature is added to detect threats that are hidden in memory.

Security Center editions for which the quota for the application protection feature is purchased

2024-04-17

Use the in-memory webshell prevention feature

Configuration assessment

Feature iteration

Quick fixing is provided for more than 50 check items.

Security Center editions for which the quota for the configuration assessment feature is purchased or the feature is enabled by using the pay-as-you-go billing method

2024-04-17

Use the configuration assessment feature

Anti-ransomware (bait capture)

Feature iteration

Linux servers are supported.

Advanced, Enterprise, and Ultimate

2024-04-17

Enable features on the Host Protection Settings tab

Baseline check

Feature iteration

The baseline type of Center for Internet Security (CIS) compliance is renamed internationally agreed best practices for security.

Advanced, Enterprise, and Ultimate

2024-04-11

Baseline check

SDK for malicious file detection

Feature iteration

File packages can be decompressed for malicious file detection.

Security Center editions for which the quota for the SDK for malicious file detection feature is purchased

2024-04-11

SDK for malicious file detection

Threat analysis and response - Log management

New feature

  • The Log Search page is renamed Log Management.

  • The log search capability is renamed hot data.

  • Cold data storage is added to the log management feature to provide storage capabilities at lower storage costs.

Security Center editions for which the log storage capacity for the threat analysis and response feature is purchased

2024-04-02

Manage logs

Configuration assessment

Feature iteration

In the Security Center console, Alibaba Cloud accounts on the China site (aliyun.com) can be used to perform checks related to Resource Access Management (RAM) only on assets that reside in regions in China, and Alibaba Cloud accounts on the international site (alibabacloud.com) can be used to perform RAM-related checks only on assets that reside in regions outside China. The historical scan results are retained in the regions of the assets.

Security Center editions for which the quota for the configuration assessment feature is purchased or the feature is enabled by using the pay-as-you-go billing method

2024-04-01

[Configuration assessment] RAM-related check items are supported only in the regions where Alibaba Cloud accounts are created

March 2024

Feature

Category

Description

Involved edition

Release date

References

Threat analysis and response

Feature iteration

The threat analysis feature is renamed threat analysis and response.

Security Center editions for which the log storage capacity for the threat analysis and response feature is purchased

2024-03-29

Overview of threat analysis and response

Container file protection

Feature iteration

A process whitelist and a file path whitelist can be configured during the creation of a rule for container file protection.

Ultimate

2024-03-19

Use the container file protection feature

SDK for malicious file detection

Feature iteration

Adware, cracking programs, and private game servers can be detected.

Security Center editions for which the quota for the SDK for malicious file detection feature is purchased

2024-03-01

Supported virus types

February 2024

Feature

Category

Description

Involved edition

Release date

References

Core file monitoring

Feature iteration

Alert notifications by using DingTalk chatbots are supported for the core file monitoring feature.

Enterprise and Ultimate

2024-02-23

Configure notification settings

Baseline check

Feature iteration

Custom weak password rules can be added to existing weak password rules.

Advanced, Enterprise, and Ultimate

2024-02-22

Add custom weak password rules

Application protection

Feature iteration

  • A protection policy group can be configured to manage the check types and the detection modes in a fine-grained manner. The detection modes are standard, loose, and strict.

  • The whitelist entry point is added on the Application Protection > Attack Alerts tab.

Security Center editions for which the quota for the application protection feature is purchased

2024-02-22

Use the application protection feature

Configuration assessment

Feature iteration

The pay-as-you-go billing method is supported.

All editions

2024-02-19

Overview of configuration assessment

Agentless detection

Feature iteration

The agentless detection feature is available for commercial use and is no longer free of charge. If you have enabled this feature free of charge, you can use this feature free of charge until the end of the public preview on March 5, 2024. After the public preview ends, you must enable this feature by using the pay-as-you-go billing method to use this feature.

All editions

2024-02-02

Public preview of agentless detection ends

January 2024

Feature

Category

Description

Involved edition

Release date

References

Security report

Feature iteration

The Security Report page in the Security Center console is optimized.

Advanced, Enterprise, and Ultimate

2024-01-31

Security report

Overview

Feature iteration

The content of the security information module is optimized.

All editions

2024-01-29

Overview

Risk governance

Feature iteration

The risk management module is renamed risk governance.

All editions

2024-01-26

None

Configuration assessment

Feature iteration

If you do not purchase a quota for configuration assessment, 25 check items are provided free of charge.

All editions

2024-01-19

Overview of configuration assessment

Vulnerability management

Feature iteration

The Show Only Exploitable Vulnerabilities feature is supported when you select Outside China as the region of the asset that you want to protect.

All editions

2024-01-05

View and handle vulnerabilities

December 2023

Feature

Category

Description

Involved edition

Release date

References

Threat analysis

Feature iteration

  • Event details can be exported in Excel files.

  • Dashboards are added to monitor and manage the security posture of enterprises across different cloud platforms, accounts, and services, and to visualize security operation.

Security Center editions for which the log storage capacity for the threat analysis feature is purchased

2023-12-29

Handle security events

Configuration assessment

Feature iteration

  • The audit logs of Tencent Cloud and Amazon Web Services (AWS) can be added to complete the detection for Tencent Cloud and AWS in terms of Cloud Infrastructure Entitlements Management (CIEM).

  • The Risk Overview tab is added to provide risk reports for cloud assets.

Anti-virus, Advanced, Enterprise, and Ultimate

2023-12-2

Container image scan

Feature iteration

The container image scan feature is supported in the following regions: China (Qingdao) and China (Zhangjiakou).

Security Center editions for which the quota for the container image scan is purchased

2023-12-21

Overview of container image scan

SDK for malicious file detection

Feature iteration

A scan policy can be configured at the bucket level.

Security Center editions for which the quota for the SDK for malicious file detection feature is purchased

2023-12-14

Export detection results

Log analysis

Feature iteration

  • Port snapshots are renamed network snapshots in log analysis.

  • Application protection logs are supported.

Security Center editions for which the log storage capacity for the log analysis feature is purchased

2023-12-12

Log types and log fields

Threat analysis

Feature iteration

The dataset capability is added to manage multiple data objects in a centralized manner. The data objects include IP address blacklists and whitelists, lists of core assets, and indicators of compromise (IOC)-related custom threat intelligence.

Security Center editions for which the log storage capacity for the threat analysis feature is purchased

2023-12-11

Create a dataset

November 2023

Feature

Category

Description

Involved edition

Release date

References

Anti-ransomware

Feature iteration

The VSS parameter used in anti-ransomware policies is unpublished to improve user experience for the anti-ransomware feature.

Security Center editions for which the anti-ransomware feature is enabled

2023-11-29

[Notice] The VSS parameter used in anti-ransomware policies will be unpublished

Agentless detection

Feature iteration

Servers in the China (Zhangjiakou) region are supported for the agentless detection feature.

Enterprise and Ultimate

2023-11-24

Use the agentless detection feature

Baseline check

Feature iteration

The following container security-related baselines are added to the baseline check feature:

  • Baselines for weak passwords and unauthorized access during container runtime

  • CIS baseline for pods during the runtime of Kubernetes and Container Service for Kubernetes (ACK)

  • CIS baseline for Kubernetes

Advanced, Enterprise, and Ultimate

2023-11-20

Baseline check

Alerts

Feature iteration

DDoS attack alerts are no longer displayed in Security Center, and related alert notifications are no longer sent by Security Center. This helps prevent duplicate alerts after Anti-DDoS Basic supports DDoS attack alerting.

All editions

2023-11-14

[Notice] Security Center stops alerting for DDoS attacks

Security Center agent

Feature iteration

Windows 10 and Windows 11 are supported for the Security Center agent.

All editions

2023-11-14

Operating systems supported by the Security Center agent

Vulnerability management

Feature iteration

Quick vulnerability fixing is supported in the Basic, Value-added Plan, and Anti-virus editions of Security Center. You can purchase the quick vulnerability fixing capability by using the pay-as-you-go billing method to fix Linux software and Windows system vulnerabilities.

Basic, Value-added Plan, and Anti-virus

2023-11-10

Purchase the vulnerability fixing feature

Serverless asset protection

New feature

Alibaba Cloud serverless assets such as elastic container instances can be added to Security Center for protection. Security Center provides threat detection and alerting, vulnerability scanning, and baseline check for serverless assets.

Ultimate

2023-11-10

Serverless assets (public preview)

Threat analysis

Feature iteration

  • The log analysis feature of the threat analysis module is renamed log search.

  • The entry point to the log analysis feature of the threat analysis module is moved to the risk management module of Security Center.

  • The two-way redirection between the Log Search page of the threat analysis module and the Log Analysis page of the risk management module is not supported in the Security Center console.

Security Center editions for which the log storage capacity for the threat analysis feature is purchased

2023-11-02

Manage logs

October 2023

Feature

Category

Description

Involved edition

Release date

References

Threat analysis - Service integration

Feature iteration

Alert logs of Tencent Cloud WAF and Cloud Firewall, and Huawei Cloud WAF and CFW can be added to threat analysis for centralized management.

Value-added Plan

2023-10-30

Handle security events

Security score

Feature iteration

A deduction item is added to the deduction module named Key function configure of the security score feature. The deduction item is used to check whether users who purchase the quota for application protection create application groups.

Value-added Plan

2023-10-25

Overview

Container image scan

Feature iteration

The alerts that are generated for scans of sensitive image files can be handled.

Ultimate

2023-10-20

View and handle detected image risks

Threat analysis - Log search

Feature iteration

  • The log analysis capability of threat analysis is separated from the log analysis feature of Security Center and is renamed log search.

  • The entry point to the log analysis feature of Security Center is moved to the Risk Management module in the left-side navigation pane of the Security Center console.

Value-added Plan

2023-10-19

Handle security events

Threat analysis

Feature iteration

The threat analysis configurations and cloud service security logs that are generated in data management centers (China and Outside China) can be separately stored and managed to meet compliance requirements.

Value-added Plan

2023-10-18

Application protection

New feature

The weakness analysis feature is supported. The feature supports detection of weak configurations during application runtime and helps identify weaknesses that can be exploited by attackers.

Value-added Plan

2023-10-18

Use the application protection feature

Non-image program defense

Feature iteration

Custom rules can be created for the feature of non-image program defense.

Ultimate

2023-10-10

Use the feature of proactive defense for containers

September 2023

Feature

Category

Description

Involved edition

Release date

References

Baseline check

Feature iteration

The baselines against the CIS benchmark are supported for the baseline check feature. The baselines are suitable for the master node and worker nodes in a Kubernetes cluster.

Ultimate

2023-09-30

Baseline check

Configuration assessment

Feature iteration

The configuration assessment feature is updated to detect configuration risks of cloud services deployed on third-party cloud service platforms, including Tencent Cloud and AWS.

Value-added Plan

2023-09-25

Add a third-party asset to Security Center

Baseline check

Feature iteration

The baselines against the CIS benchmark are supported in containerd scenarios. The baselines are suitable for Alibaba Cloud ACK pods and Kubernetes pods.

Ultimate

2023-09-28

Baseline check

Log analysis

Feature iteration

The in and out fields are added to network session logs to identify the data transmission direction of a network session.

Value-added Plan

2023-09-21

Log types and log fields

Security score

Feature iteration

A deduction item is added to the deduction module named Key function configure of the security score feature. The deduction item is used to detect threats of containers.

Ultimate

2023-09-20

Overview

Protection mode management

Feature iteration

The protection mode management is split into the features of alert settings and client resource management.

All editions

2023-09-13

Container escape prevention

Feature iteration

System rules and custom rules are supported by the container escape prevention feature.

Ultimate

2023-09-08

Container escape prevention

August 2023

Feature

Category

Description

Involved edition

Release date

References

Threat analysis - SOAR

Feature iteration

The Alert Trigger mode is added to automatic response rules. This way, the system can automatically run playbooks to perform operations on the alert-triggering objects, such as blocking IP addresses, quarantining files, and detecting and removing processes.

Value-added Plan

2023-08-28

Use SOAR

Vulnerability fixing

Feature iteration

The error codes such as 127 and 8080 about vulnerability fixing failures are added.

Anti-virus, Advanced, Enterprise, and Ultimate

2023-08-24

Causes and solutions to vulnerability fixing failures

Agentless detection

New feature

  • The vulnerability whitelist feature is supported.

  • The sensitive file scan feature is supported.

Advanced, Enterprise, and Ultimate

2023-08-22

Use the agentless detection feature

Alerts

Feature iteration

Alerts that are generated for malicious network activities are no longer supported in Security Center. This helps improve detection capabilities.

Anti-virus, Advanced, Enterprise, and Ultimate

2023-08-18

Overview of alerts

Notification

New feature

The notifications of running anti-ransomware backup tasks or restoration tasks can be sent.

Anti-virus, Advanced, Enterprise, Ultimate, and Value-added Plan editions for which the anti-ransomware capacity is purchased

2023-08-14

Configure notification settings

Non-image program defense

Feature iteration

The untrusted process defense feature is renamed non-image program defense.

Ultimate

2023-08-11

Non-image program defense

ECS instance management across accounts

Discontinued

Elastic Compute Service (ECS) instances can no longer be managed as external hosts. If you install the Security Center agent on an ECS instance that belongs to a different Alibaba Cloud account by using installation commands and add the ECS instance to Security Center for protection, the ECS instance is considered an external host managed by Security Center. If you want to manage ECS instances that belong to different Alibaba Cloud accounts, use the multi-account management feature.

All editions

2023-08-10

Use the multi-account management feature

Threat analysis

Feature iteration

The logs of the configuration assessment feature of Security Center can be added to threat analysis for analysis and query.

All editions

2023-08-02

Handle security events

Anti-ransomware

Feature iteration

The Internet and private networks are supported when you configure protection policies for servers that are not deployed on Alibaba Cloud.

Value-added Plan

2023-08-02

Create an anti-ransomware policy

Terraform

New feature

Security Center can be activated by using Terraform.

All editions

2023-08-01

Activate Security Center by using Terraform

July 2023

Feature

Category

Description

Involved edition

Release date

References

Alerts

Feature iteration

Cloud threat detection is available in Security Center Basic. Users of the Basic, Anti-virus, and Advanced editions can view the details of cloud threat detection.

Basic, Anti-virus, and Advanced

2023-07-31

Functions and features

Anti-ransomware

Feature iteration

The following regions are supported by the anti-ransomware feature: Singapore, Philippines (Manila), and SAU (Riyadh - Partner Region).

Anti-virus, Advanced, Enterprise, Ultimate, and Value-added Plan in which the anti-ransomware capacity is purchased

2023-07-25

Overview of anti-ransomware

Notification

New feature

Notifications of excessive anti-ransomware capacity can be sent.

Anti-virus, Advanced, Enterprise, Ultimate, and Value-added Plan in which the anti-ransomware capacity is purchased

2023-07-21

Configure notification settings

SDK for malicious file detection

New feature

SDK for malicious file detection is released. The feature is developed based on various threat detection engines of Security Center. The feature provides easy-to-use malicious file detection and Object Storage Service (OSS) object detection that can help you identify malicious objects.

Anti-virus, Advanced, Enterprise, Ultimate, and Value-added Plan in which the quota on SDK for malicious file detection is purchased

2023-07-20

SDK for malicious file detection

Threat analysis - Disposal center

New feature

The disposal center is provided by the threat analysis feature to display event handling policies and tasks by event. This helps you view event handling details in a centralized manner.

Value-added Plan

2023-07-19

View the disposal center

Vulnerability management

Feature iteration

The vulnerability fixing feature is supported for the Anti-virus and Value-added Plan editions. You must purchase a quota for the feature before you can use the feature.

Anti-virus and Value-added Plan

2023-07-18

View and handle vulnerabilities

Application protection

Feature iteration

The application protection feature is available for commercial use and can no longer be enabled free of charge. If you have enabled the feature free of charge, you can continue using it until the public preview ends on August 17, 2023.

Advanced, Enterprise, and Ultimate

2023-07-18

Use the application protection feature

Service

Feature iteration

The service name is changed to Security Center.

All editions

2023-07-15

What is Security Center?

Agent

Feature iteration

The supported operating systems of the Security Center agent and the supported operating systems of the client protection feature are updated.

All editions

2023-07-14

Operating systems supported by the Security Center agent

Enable features on the Agent Settings tab

Application protection

New feature

The Application Analysis tab is added. You can view statistics of application protection on this tab, including analysis results of application behavior in the last seven days and application access statistics.

Advanced, Enterprise, and Ultimate

2023-07-14

Use the application protection feature

Detection of AccessKey pair leaks

Feature iteration

The triggering of alerts on AccessKey pair leaks is optimized. Security Center sends an alert notification to you only when an AccessKey pair leak is detected and the AccessKey secret is valid.

All editions

2023-07-14

Detection of AccessKey pair leaks

Agentless detection

Feature iteration

  • The Scan Configuration panel is added. You can configure vulnerability scan settings, including the scan cycle, scan scope, and detection scope.

  • The Malicious Sample tab is renamed the Alerts tab. You can also configure alert whitelists to manage detected alerts.

Advanced, Enterprise, and Ultimate

2023-07-14

Use the agentless detection feature

Installation of Security Center agent

Feature iteration

The installation commands for Windows servers are optimized. Installation commands for Command Prompt and PowerShell are provided for Windows servers.

All editions

2023-07-14

Install the Security Center agent

Configuration assessment

Feature iteration

Check items can be customized. You are charged based on the number of times that each check item is used.

All editions

2023-07-13

Overview of configuration assessment

June 2023

Feature

Category

Description

Involved edition

Release date

References

Security score

Feature iteration

The security score feature is optimized. Security Center allows you to configure custom penalty points for each deduction module based on your business requirements.

All editions

2023-06-30

Overview

Exposure analysis

New feature

The exposure analysis feature is provided to identify container clusters that are exposed on the Internet.

Ultimate

2023-06-28

Manage container assets

Anti-ransomware

Feature iteration

The entry point to backup tasks is added. You can view the details of backup tasks and the error messages of failed backup tasks.

All editions

2023-06-20

Troubleshoot the issues that cause the abnormal status of the anti-ransomware agent and backup tasks

Overview

Feature iteration

The Overview tab on the Overview page is optimized. You can view information about Security Center, such as the agent installation rate, agent online rate, and distribution of servers by operating system.

All editions

2023-06-08

View information on the Overview tab

Alerts

Feature iteration

Remarks can be entered when you handle alerts. This helps you manage the handled alerts.

All editions

2023-06-08

View and handle alerts

May 2023

Feature

Category

Description

Involved edition

Release date

References

Application protection

Feature iteration

The process of automatic access is optimized. The Select Asset dialog box is added, which allows you to add assets for application protection by using the automatic access method in an easier manner.

Advanced, Enterprise, and Ultimate

2023-05-31

Application protection (public preview)

Downgrade

Feature iteration

The value of the Protected Servers or Cores parameter can be decreased when you downgrade Security Center.

Anti-virus, Advanced, Enterprise, and Ultimate

2023-05-25

Upgrade and downgrade Security Center

Container asset overview

Feature iteration

The container network topology feature is renamed the container asset overview feature.

Ultimate

2023-05-11

Use the feature of container asset overview

SOAR

New feature

SOAR is launched. SOAR is a comprehensive security solution in which different systems and services are orchestrated and connected based on specific logic. This solution supports automated orchestration and quick response during security O&M.

Anti-virus, Advanced, Enterprise, Ultimate, and Value-added Plan in which the threat analysis feature is purchased

2023-05-10

Use SOAR

Virus blocking

Feature iteration

The virus blocking feature is renamed the malicious host behavior prevention feature.

Anti-virus, Advanced, Enterprise, and Ultimate

2023-05-05

Enable features on the Host Protection Settings tab

Proactive defense for containers

Feature iteration

Alert events that are generated by the feature of proactive defense for containers are moved to the Alerts page. The container escape prevention feature and the untrusted process defense feature are integrated and moved to the Proactive Defense for Containers page.

Ultimate

2023-05-05

Use the feature of proactive defense for containers

April 2023

Feature

Category

Description

Involved edition

Release date

References

Application protection

New feature

The application protection feature is released. The Java processes of servers and containers can be added to the application protection feature by using the automatic access method. If you use the automatic access method, you do not need to restart the processes. This helps ensure business continuity.

Advanced, Enterprise, and Ultimate

2023-04-23

Use the application protection feature

Vulnerability management

Feature iteration

The issues that cause vulnerability fixing failures are displayed in the Security Center console. The "Troubleshoot the issues that cause vulnerability fixing failures" topic is also provided. You can handle vulnerability fixing failures based on the topic.

Advanced, Enterprise, and Ultimate

2023-04-20

Troubleshoot issues that cause vulnerability fixing failures

Security score

Feature iteration

The deduction items for the security score are optimized. The maximum penalty point of each module is also limited.

All editions

2023-04-20

Improve the security score

Threat analysis

New feature

The threat analysis feature is released. The feature collects the security logs and alerts of multiple Alibaba Cloud accounts and cloud services. Then, the feature aggregates and analyzes the logs and alerts based on built-in threat detection rules to detect unknown threats. The feature also allows you to configure custom rules.

Anti-virus, Advanced, Enterprise, Ultimate, and Value-added Plan in which the threat analysis feature is purchased

2023-04-18

Overview

Container file protection

New feature

The container file protection feature is released. The feature monitors directories and files in containers in real time, and generates alerts or intercepts tampering operations when the directories or files are tampered with. This prevents applications from being inserted with illegal information or malicious code.

Ultimate

2023-04-13

Container file protection

Virus detection and removal

Feature iteration

The antivirus feature is renamed the virus detection and removal feature. The custom directory scan feature is also released.

Anti-virus, Advanced, Enterprise, and Ultimate

2023-04-07

Use the virus detection and removal feature

March 2023

Feature

Category

Description

Involved edition

Release date

References

Multi-cloud configuration management

New feature

Microsoft Azure virtual machines can be added to Security Center for protection.

All editions

2023-03-31

Add a third-party asset to Security Center

Multi-account management

Feature iteration

  • The multi-account control feature is renamed the multi-account management feature.

  • Dashboards are added to display statistics on items such as security scores, at-risk assets, and alerts. You can monitor the risk trends of members in your resource directory by using the management account of your resource directory or a delegated administrator account in a centralized manner.

Anti-virus, Advanced, Enterprise, and Ultimate

2023-03-31

Use the multi-account management feature

Log analysis

New feature

Configuration assessment logs are supported.

Anti-virus, Advanced, Enterprise, and Ultimate

2023-03-28

Log types and log fields

Proxy access

Feature iteration

The proxy access feature is optimized. You can add servers to Security Center by configuring proxy servers.

All editions

2023-03-22

Use the proxy access feature

Host-specific rule management

Feature iteration

The entry points to specific modules are removed to the Protection Configuration > Host Protection > Host-specific Rule Management page. The modules are malicious behavior defense, defense against brute-force attacks, and approved logon management. The approved logon management module allows you to configure approved logon locations, approved logon IP addresses, approved logon time ranges, and approved logon accounts.

All editions

2023-03-17

Use the host-specific rule management feature

Multi-account management

Feature iteration

The multi-account management feature is optimized. You can use the management account of your resource directory or a delegated administrator account to switch between the members in your resource directory and view data in Security Center console of different members.

All editions

2023-03-15

Use the multi-account management feature

Service-linked role for Security Center

New feature

The AliyunServiceRoleForSasRd service-linked role is added. The role allows the delegated administrator accounts of Security Center to log on to the Security Center console of the members in the resource directory to which the delegated administrator accounts belong. This applies when the multi-account management feature is enabled.

All editions

2023-03-15

Service-linked roles for Security Center

Untrusted process defense

New feature

The untrusted process defense feature is released. The feature can detect and block the startup of programs that are not included in the images of your containers during the running of the containers. This helps defend against malicious software intrusion.

Ultimate

2023-03-10

Untrusted process defense

February 2023

Feature

Category

Description

Involved edition

Release date

References

Configuration assessment

Feature iteration

Security Center allows you to modify the configurations of specific check items, such as OSS Bucket Immobilizer Configuration, Idle user cleaning, and Password_validity.

All editions

2023-02-22

Overview of configuration assessment

Agentless detection

Feature iteration

The agentless detection feature can check data disks of ECS instances.

Advanced, Enterprise, and Ultimate

2023-02-07

Use the agentless detection feature

Application protection

New feature

The application protection feature is upgraded. You can configure a whitelist to allow specific access requests.

Advanced, Enterprise, and Ultimate

2023-02-03

Use the application protection feature

New feature

The QR code of the DingTalk group for the application protection feature is provided on the Application Protection page in the Security Center console. The DingTalk group is numbered 24655011781. You can scan the QR code to join the DingTalk group to obtain technical support for the following scenarios: configure the application protection feature, enable the application protection feature for an application, and use the feature.

Advanced, Enterprise, and Ultimate

2023-02-01

January 2023

Feature

Category

Description

Involved edition

Release date

References

Web tamper proofing

Feature iteration

Web tamper proofing is supported for Anolis OS 8.6 RHCK and Anolis OS 8.6 ANCK.

Anti-virus, Advanced, Enterprise, and Ultimate

2023-01-06

Use the feature of web tamper proofing

Security Center release

New feature

Security Center can be released with a few clicks after it expires. You can repurchase Security Center and select specifications based on your business requirements.

Anti-virus, Advanced, Enterprise, and Ultimate

2023-01-05

None

Security Center release notes

For more information about the release notes of Security Center earlier than 2023, see Release notes (earlier than 2023).